Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security

Version 1 : Received: 23 April 2021 / Approved: 26 April 2021 / Online: 26 April 2021 (13:24:46 CEST)

How to cite: Atwal, E.S.; Kumar, D.U. A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security. Preprints 2021, 2021040673. https://doi.org/10.20944/preprints202104.0673.v1 Atwal, E.S.; Kumar, D.U. A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security. Preprints 2021, 2021040673. https://doi.org/10.20944/preprints202104.0673.v1

Abstract

With the emerging technology connected with the internet, there is one constant issue related to that is data security. The only solution with which this issue can be resolved at a limit and can be used to protect the data is various algorithms for encryption. Though different approaches were used for the same, Cryptography seems to be efficiently protecting the data while transmitting in network from sender to receiver. Firstly the data is encrypted before sending to receiver using the most secure and reliable encryption algorithm. Secondly, at the receiver end it can be decrypted using the same decryption algorithm. Only receiver will have the key with which the data can be decrypted. In this paper, AES, DSS and RSA algorithms were implemented. These algorithms are encryption algorithms which perform encoding and decoding of data, to be sent from sender to receiver, using the keys. Each have different criteria for encryption and are then compared based on different parameters viz. delay, throughput, PDR is an acronym for packet delivery ratio, PLR represents packet loss ratio and RPC denotes Received Packet Count. The results in the form of graphs are given to analyze the security provided by each algorithm.

Keywords

AES; DSS; RSA; security; cryptography; encryption; decryption

Subject

Engineering, Control and Systems Engineering

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.